Cloudbleed Is the Latest Internet Problem and It Gets Worse

Huge security disasters like Cloudbleed are never fun. However, as more information about the newly reported vulnerability becomes available, we can understand how dangerous bugs stand to screw up the internet. Luckily, in the case of Cloudbleed, it’s not as bad as it could have been. But it’s not good, either. Cloudbleed, if you hadn’t…

You Can Get Hacked By Opening a Picture

You Can Get Hacked By Opening a Picture in JPEG 2000 Format. Researchers have disclosed a critical zero-day vulnerability in the JPEG 2000 image file format parser implemented in OpenJPEG library, which could allow an attacker to remotely execute arbitrary code on the affected systems. Discovered by security researchers at Cisco Talos group, the zero-day…

What is Edward Snowden up to

The NSA whistleblower posted a puzzling tweet on Aug 3. He said, “It’s time” and requested his former colleagues, probably who were working with NSA, to reconnect with him. Snowden also mentions the name of Barton Gellman. Did you work with me? Have we talked since 2013? Please recontact me securely, or talk to @bartongellman….

iOS Device Ransom Attacks Continue to Target Users

A few years ago, a number of users in Australia were victimized by attackers remotely locking iPhones, iPads, and Macs using Find My iPhone on iCloud. Compromised devices typically displayed Russian ransom messages demanding payments of around $50 to $100 for the device to be unlocked.   At the time, IT security expert Troy Hunt…

Millions of Android Devices Have Flawed

A security researcher was able to easily nullify Android’s full disk encryption that is utilized by millions of devices. According to Techspot, the implementation of full disk encryption on Google’s Android mobile operating system has been an important step forward in terms of security and personal privacy. However, the security measure is not fail proof, as…